Google Cloud Armor
Help protect your applications and websites against denial of service and web attacks.
Benefit from DDoS protection and WAF at Google scale
Detect and mitigate attacks against your Cloud Load Balancing workloads
Mitigate OWASP Top 10 risks and help protect workloads on-premises or in the cloud
Benefit from DDoS protection and WAF at Google scale
Detect and mitigate attacks against your Cloud Load Balancing workloads
Mitigate OWASP Top 10 risks and help protect workloads on-premises or in the cloud
BENEFITS
Enterprise-grade DDoS defense
Cloud Armor benefits from our experience of protecting key internet properties such as Google Search, Gmail, and YouTube. It provides built-in defenses against L3 and L4 DDoS attacks.
Mitigate OWASP Top 10 risks
Cloud Armor provides predefined rules to help defend against attacks such as cross-site scripting (XSS) and SQL injection (SQLi) attacks.
Managed Protection
With Cloud Armor Managed Protection Plus tier, you will get access to DDoS and WAF services, curated rule sets, and other services for a predictable monthly price.
Key features
IP-based and geo-based access control
Filter your incoming traffic based on IPv4 and IPv6 addresses or CIDRs. Enforce geography-based access controls to allow or deny traffic based on source geo using Google’s geoIP mapping.
Support for hybrid and multi-cloud deployments
Help defend applications from DDoS or web attacks and enforce Layer 7 security policies whether your application is deployed on Google Cloud or in a hybrid or multi-cloud architecture.
Visibility and monitoring
Easily monitor all of the metrics associated with your security policies in the Cloud Monitoring dashboard. You can also view suspicious application traffic patterns from Cloud Armor directly in the Security Command Center dashboard.
Pre-configured WAF rules
Out-of-the-box rules from the ModSecurity Core Rule Set to help defend against attacks like cross-site scripting (XSS) and SQL injection. RFI, LFI, and RCE rules are also available in beta.
Named IP Lists
Allow or deny traffic through a Cloud Armor security policy based on a curated Named IP List (beta).
Comments
Post a Comment